About your Search

20121101
20121130
Search Results 0 to 1 of about 2
are strong. you can identify that pattern and when and former partners. dhs, fbi, cia, the white house, we sit on these policy boards so that we can all collectively address the problem that will take us into the next century. our best defense is going to be understanding the offense. as an intelligence organization, we spend a lot of time in the offensive mud. we collect human intelligence. as they consider ways to address the threats in the 21st century, left to also understand they're not all technology base. you all of legislation that drives what you do every day. i would anticipate this year, senator collins introduced a cyber security bill. it was geared towards a single owner of all things cyber. it is kind of hard when you have millions of people working for the government. in the end, you'll see cyber legislation that addresses standards of operating -- operating standards of performance, standards of protection, and how each agency does it will be very different. so much like a common definition lexicon, there will be standards. laws that can define acceptable behavior in cybers
more problematic. i think one of the other panelists mentioned this quote from fbi director, and you see the same concerns of talking about in the commercial sphere, to. he said basically set to every company is being hacked one way or another and it's not a question of when they will be hacked. it will be a question of when it will happen again. that might be a pessimistic view of how bitter cybersecurity sector can be. it is certainly a theme you see in the space. my only point, the only other point i want to make on commercial data is that you see and report. there was a report issued by verizon about data breach investigation, that suggests that a lease in endears large numbers of serious cyber intrusions intrusions have been aimed at create taking authentication credential, passwords, usernames, things like that. things that can be used for later inclusion's in the future, things that might give an intruder broader access to a network. so i'd like to shift for a moment, those ideas in mind, and talk about offense of cyber operations. and what do we mean by that and what is, what
Search Results 0 to 1 of about 2